DISCARDED: Tales From the Threat Research Trenches
Podcast image
Regional Threats, Global Impact: A TA2725 Case Study
38 mins; March 26, 2026
TrustConnect RAT: Inside a Vibe-Coded Malware Ecosystem
42 mins; March 10, 2026
AI as a Tool, Not a Replacement: Malware Research in the Age of LLMs
50 mins; February 26, 2026
Snowball Learning: Getting Real About Cybersecurity Training
42 mins; February 10, 2026
Emerging Threats in 2026: Inside Proofpoint’s Detection Playbook
45 mins; January 29, 2026
Operation EndOfYear: New Malware, Popular Tactics, and Where AI Is Taking Us
56 mins; December 31, 2025
Ho-Ho-Hold Up—Is That Message Real? Bad Santas Are Sending Seasonal Scams
33 mins; December 09, 2025
From Toasters to Botnets: Securing Everyday IoT
37 mins; November 18, 2025
Elect More Hackers: Tech Skills for Real-World Change
54 mins; November 04, 2025
From Web Injects to Info Stealers: How Cybercriminals Stay Ahead
60 hours 53 mins; October 21, 2025
When Being Aware of Cybersecurity Means Knowing You're Human
48 mins; October 08, 2025
Hot sauce and hot takes: An Only Malware in the Building special
34 mins; September 23, 2025
Freighty Cats: RFQ Phishing Comes to A Warehouse Near You
35 mins; September 09, 2025
Direct Send Exploitation & URL Rewrite Attacks: What Security Teams Must Know
43 mins; August 26, 2025
Phish, Chips & Voldemort: Inside China’s Cyber Targeting of Taiwan
42 mins; August 12, 2025
Threat Actor Theater: TA2541, TA558, and the Cyber Heist Crew TA582
37 mins; July 29, 2025
10 Things I Hate About Attribution: A Clustering Conundrum
56 mins; July 15, 2025
Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook
52 mins; July 01, 2025
Signatures and Surprises: Inside the Emerging Threats Team
43 mins; June 18, 2025
DBIR Deep Dive: Identity, Access, and the Expanding Attack Surface
51 mins; June 04, 2025
The ClickFix Convergence: How Threat Actors Blur the Lines
35 mins; May 14, 2025
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58 mins; April 29, 2025
Diving Into Cyber Journalism: FOIA, Fraud, and the Fight Against Online Threats
46 mins; April 09, 2025
RMM Tools: The New Cybercrime Trick?
37 mins; March 25, 2025
Your Best Defense against Social Engineering: The Gray-Matter Firewall
51 mins; March 11, 2025
Hiding in Plain Sight: How Defenders Get Creative with Image Detection
45 mins; February 25, 2025
Cyber Groundhog Day and romance scams, featuring Only Malware in the Building
40 mins; February 05, 2025
The Power of Partnerships: An Interview with the NSA’s Kristina Walter
39 mins; January 22, 2025
The Battle for a Safer Internet: Inside Domain Takedowns and Threat Actor Tactics
38 mins; January 07, 2025
Hackers, Heists, and Heroes: The Evolving Ransomware Game
57 mins; December 17, 2024
Stealth, Scale, and Strategy: Exploring China’s Covert Network Tactics
49 mins; December 03, 2024
Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish
51 mins; November 15, 2024
Pig Butcher Scammers Put Job Seekers On The Menu
39 mins; October 29, 2024
Under Siege: How Hackers Exploit Cloud Vulnerabilities
33 mins; October 15, 2024
Champagne Attack Chains on a Kool-Aid Budget
33 mins; September 30, 2024
Guarding the Vote: Unmasking Cyber Threats in Election Season
32 mins; September 17, 2024
Very Mindful, Very APT: Inside the Activity of Current Espionage Actors
49 mins; September 04, 2024
Rebel Security Training: Cyber Lessons from A Galaxy Far, Far Away
57 mins; August 20, 2024
The Art of Frustrating Hackers: Diving Into the DEaTH Cycle with Randy Pargman
52 mins; August 06, 2024
The Hunt for Cyber Criminals: A Deep Dive with Wired's Andy Greenberg
55 mins; July 24, 2024
Have you heard: Only Malware in the Building?
3 mins; July 15, 2024
Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques
33 mins; July 09, 2024
Checkmate: Breaking Down Operation Endgame
46 mins; June 25, 2024
Hacking the Human Mind: How Cyber Attackers Exploit Our Brains
51 mins; June 11, 2024
Decrypting Cyber Threats: Tactics, Takedowns, and Resilience
43 mins; May 29, 2024
It Works on My Machine: Why and How Engineering Skills Matter in Threat Research
46 mins; May 08, 2024
Decoding TA4903: Exploring the Dual Objectives of a Unique Cyber Threat Actor
40 mins; April 02, 2024
A Trip Down Malware Lane: How Today's Hottest Malware Stacks Up Against Predecessors
56 mins; March 19, 2024
Hiding In Plain Sight: Unique Methods Of C2 From Infostealers
27 mins; March 05, 2024
From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions
47 mins; February 20, 2024
Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone
55 mins; February 06, 2024
Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024
66 hours 16 mins; January 23, 2024
Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024
44 mins; January 09, 2024
Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit
64 hours 58 mins; December 26, 2023
I Know This Might Sound Crazy but Russia’s TA422 Blasted Lots of Exploits
50 mins; December 12, 2023
MITRE ATT&CK Evolves with Cyber Threat Sophistication
50 mins; November 29, 2023
Looking Behind the Curtain at the Palestinian-Aligned TA402
23 mins; November 14, 2023
Unmasking the Tricksters: The World of Fake Browser Updates
31 mins; October 31, 2023
Decoding the Malware Maze: Insights From a Threat Researcher
33 mins; October 17, 2023
Obfuscated: Online Threats and the Visually Impaired
28 mins; October 04, 2023
DISCARDED: Live with John Hultquist!
30 mins; September 22, 2023
From Rio to Madrid: Unmasking the Brazilian Banking Malware Wave
28 mins; September 05, 2023
Everything Comes Back in Style: How Old TTPs are Remerging in China's E-Crime Ecosystem
37 mins; August 22, 2023
It Works on My Machine: Why and How Engineering Skills Matter in Threat Research
46 mins; August 08, 2023
An Apple a Day Won't Keep Iranian APT Away: How TA453 Targets Macs
35 mins; July 25, 2023
Threats and Risks in the Global South
43 mins; July 11, 2023
Weird & Wacky Researcher Summer: The Artifacts & Detections Edition
37 mins; June 27, 2023
It's Summertime: What’s the E-crime Vibe?
44 mins; June 14, 2023
When the Threat Profile is High: Protecting At-Risk Individuals Online
32 mins; May 30, 2023
The Spies and Stalkers of Surveillance Capitalism
37 mins; May 16, 2023
Beyond Banking: IcedID Gets Forked
46 mins; May 02, 2023
“Did I miss you in Orlando?”: The Rise of SMS Phishing
27 mins; April 18, 2023
Staying Ahead of Cloud-Based Threats: Insights on today's threat landscape
30 mins; April 07, 2023
Cat-phishing Dogfighters
31 mins; March 21, 2023
Prank or Propaganda? TA499 Pesters Politics
39 mins; March 07, 2023
A Venture Mindset: North Korean Actors Go Beyond Espionage
40 mins; February 21, 2023
Why Do We Click? Understanding the Psychology of Social Engineering
58 mins; February 08, 2023
New Year, New Threats: Prepping for the 2023 Threat Landscape
39 mins; January 24, 2023
Confidence, confusion, cashout: How pig butchering is blindsiding victims
43 mins; January 10, 2023
Holiday Happy Hour: 12 Faves of Threat Research
32 mins; December 28, 2022
AMA Answers From the Threat Research Trenches
51 mins; December 13, 2022
The Many-Faced Threat: Multi-Persona Impersonation (MPI) In Your Inbox
27 mins; November 29, 2022
Machine Learning Is a Party With Camp Disco!
39 mins; November 08, 2022
Reservation Confirmed: Threat Actors Visiting the Hospitality World
39 mins; October 25, 2022
The Hallow-queen of Cybersecurity: Spooky and Sweet Takes with Sherrod DeGrippo
35 mins; October 11, 2022
Investigating Wine Fraud with the Ransomware Sommelier
49 mins; September 27, 2022
Hot off the Press: APT Actors Posing as Journalists
30 mins; September 13, 2022
Misfits Managed: Breaking Down Misfit Malware
36 mins; August 23, 2022
The Art of Threat Detection Engineering
30 mins; August 09, 2022
APT Attribution: Trials and Tribulations From the Field
31 mins; July 26, 2022
The Dark-Side of Cryptocurrency
34 mins; July 12, 2022
A Day in the Life of a Threat Researcher: Emerging Threats Edition
33 mins; June 21, 2022
The Buzz on Bumblebee Malware
30 mins; June 07, 2022
Social Engineering: How Threat Actors Manipulate Their Targets
31 mins; May 24, 2022
Paying Attention to BEC: The Most Costly Threat by Individual Losses
39 mins; May 10, 2022
Paying Attention to BEC: The Most Costly Threat by Individual Losses
39 mins; May 10, 2022
Web Bugs & the Tubthumping Tactics of Chinese Threat Actor TA416
36 mins; April 26, 2022
Defending Against Cyber Criminals: Emotet’s Resurrection & Conti’s Implosion
27 mins; April 12, 2022
Threat Actor 2541: The Latest Tricks & Patterns
23 mins; March 29, 2022
The Troubling Rise of MFA Kits
29 mins; March 15, 2022